User Web Access Records Mining For Business Intelligence

Data mining, Web | Desktop Application
User Web Access Records Mining For Business Intelligence In this project we analyse how business intelligence on a website could be obtained from user’s access records instead of web logs of “hits”. User’s access records are captured by implementing a data mining algorithm on the website. User mostly browses those products in which he is interested. This system will capture user’s browsing pattern using data mining algorithm. This system is a web application where user can view various resources on the website. User will register their profile in an exchange of a password. User will get user ID and password in order to access the system. Once the user login’s to the system user will gain access to certain resources on the website. The links to the resources on the…
Read More

Railway Tracking and Arrival Time Prediction

Android Mobile development, Web | Desktop Application
Railway Tracking and Arrival Time Prediction It has happened so many times that you have been waiting on railway station for someone to arrive and you don’t have any exact information about train timing and other stuff. So here we present to you a project on Railway Tracking and Arrival Time Prediction. Using this system user’s can get the information about train timing, and is it on time or not, and other information. In this, system will track the train timing at what time train departed from a particular station and pass these timing details to other station’s system where it will display the timing according to train departed from previous station. If system will find any delay in train due to signal it will automatically update the train timing…
Read More

Web Data Mining To Detect Online Spread Of Terrorism

Data mining, Web | Desktop Application
Web Data Mining To Detect Online Spread Of Terrorism Terrorism has grown its roots quite deep in certain parts of the world. With increasing terrorist activities it has become important to curb terrorism and stop its spread before a certain time. So as identified internet is a major source of spreading terrorism through speeches and videos. Terrorist organizations use internet to brain wash individuals and also promote terrorist activities through provocative web pages that inspire helpless people to join terrorist organizations. So here we propose an efficient web data mining system to detect such web properties and flag them automatically for human review. Data mining is a technique used to mine out patterns of useful data from large data sets and make the most use of obtained results. Data mining…
Read More

Opinion Mining For Social Networking Site

Data mining, Web | Desktop Application
Opinion Mining For Social Networking Site This system uses opinion mining methodology in order to achieve desired functionality. Opinion Mining for Social Networking Site is a web application. Here the user will post his views related to some subject other users will view this post and will comment on this post. The System takes comments of various users, based on the opinion, system will specify whether the posted topic is good, bad, or worst. User can change his own profile picture and can update his status. These changes can be viewed by various users. We use a database of sentiment based keywords along with positivity or negativity weight in database and then based on these sentiment keywords mined in user comment is ranked. Once the user logins to the system,…
Read More

Detecting E Banking Phishing Websites Using Associative Classification

Data mining, Web | Desktop Application
Detecting E Banking Phishing Websites Using Associative Classification There are number of users who purchase products online and make payment through e- banking. There are e- banking websites who ask user to provide sensitive data such as username, password or credit card details etc often for malicious reasons. This type of e-banking websites is known as phishing website. In order to detect and predict e-banking phishing website. We proposed an intelligent, flexible and effective system that is based on using classification Data mining algorithm. We implemented classification algorithm and techniques to extract the phishing data sets criteria to classify their legitimacy. The e-banking phishing website can be detected based on some important characteristics like URL and Domain Identity, and security and encryption criteria in the final phishing detection rate. Once…
Read More

Data Mining For Automated Personality Classification

Data mining, Web | Desktop Application
Data Mining For Automated Personality Classification We come across areas where we have access to large amounts of person behavioural data. This data can help us classify persons using Automated personality classification (APC). In this project, we propose an advanced APC – automated personality classification system. We here use learning algorithms along with advanced data mining to mine user characteristics data and learn from the patterns. This learning can now be used to classify/predict user personality based on past classifications. The system analyses vast user characteristics and behaviours and based on the patterns observed, it stores its own user characteristics patterns in a database. The system now predicts new user personality based on personality data stored by classification of previous user data. This system is useful to social networks as…
Read More

Content Summary Generation Using NLP

Web | Desktop Application
Content Summary Generation Using NLP To find prominent summarized points in a collection of documents. We here propose a system to detect summarized points from a huge or multiple paragraph. We use an efficient method to discover summarized points from the provided content using Natural language processing (NLP). The provided content is divided into two parts as Summarized Content and Summarized Point. One would expect particular words to appear in the content more or less frequently: “dog” and “bone” will appear more often in documents about dogs, “cat” and “meow” will appear in documents about cats, and “the” and “is” will appear equally in both. A document typically concerns multiple topics in different proportions; thus, in a document that is 10% about cats and 90% about dogs, there would probably…
Read More

Product Review Analysis For Genuine Rating

Data mining, Web | Desktop Application
Product Review Analysis For Genuine Rating Here we propose an advanced Products Review analysis system which provides a platform to registered users to rate a particular or multiple products using this system. The system uses product review analysis in order to achieve desired functionality. Product review analysis is a web application which consist multiple products added by admin to review to rate and review them. The System takes reviews of various users, based on their personal opinion, system will specify whether the posted product is good, bad, or worst. We use a database of sentiment based keywords along with positivity or negativity weight in database and then based on these sentiment keywords mined in user review is ranked. Once the user login to the system he views multiple products and…
Read More

Engineering College Automation and Scheduling System

Web | Desktop Application
Engineering College Automation and Scheduling System This project uses a web application concept to facilitate the departmental system in educational institutes. It uses the most reliable way of uniquely identifying students through website. Such type of web application is very useful in school as well as in college for daily attendance. Through this web application, we can keep a systematic record of students details, mark sheet, attendance and defaulters list. This project enables the easy way of maintaining class attendance with fewer efforts. The system also generates a brief report of attendance from the database according to subject-wise or date-wise as required. A defaulter list can be generated through system. Staff and HOD has the option to take a print of the reports and defaulter list thus generated. Hence, this…
Read More

Periodic Census With Graphical Representation

Web | Desktop Application
Periodic Census With Graphical Representation A census is the procedure of systematically acquiring and recording information about the members of a given population. It is a regularly occurring and official count of a particular population. The term is used mostly in connection with national population and housing censuses; other common censuses include agriculture, business, and traffic censuses. The United Nations defines the essential features of population and housing censuses as “individual enumeration, universality within a defined territory, simultaneity and defined periodicity”, and recommends that population censuses be taken at least every 10 years. United Nations recommendations also cover census topics to be collected, official definitions, classifications and other useful information to co-ordinate international practice.
Read More

Stream Analysis For Career Choice Aptitude Tests

Web | Desktop Application
Stream Analysis For Career Choice Aptitude Tests The need for online IQ test aroused mainly to overcome the drawbacks of the existing system. The main aim of the project is to ensure user friendly and more interactive software to the user. The IQ test brings an easy interesting working environment, more clarity in presenting appropriate information to the user and also it gives faster access and retrieval of information from the database. Through this new system, the drawbacks that have been seen in the existing system can be neglected. Under this system, questions can be stored and retrieved so that preparing of questions papers each time can be avoided. The system checks the answer by matching the pre-defined answers in database and users answer. The marking criteria is decided by…
Read More

ERP System For Institutes

Web | Desktop Application
ERP System For Institutes Engineering and medical institutes usually have a number of departments and courses. Managing all these department and course data manually is a very tedious, ineffective and expensive task. So here we propose an ERP system for institutes. We aim to provide entire examination section along with faculty dashboard and training placement department in this system. Our system firstly consists of student database needed by faculty as per their requirement. The system allows to input student attendance into the database which can later be viewed by concerned faculties and students. The students may view their personal attendance and assignment submission data through a separate student login. The examination allows authorized logins to insert update timetables. The time table is then available to be viewed on the web…
Read More

Online Ebook Maker Project

Web | Desktop Application
Online Ebook Maker Project Online E-Book Maker Project will allow users to create E-Book for free. This software will have Admin Login and Author Login. This system will allow the authors to make their E-Book without any problem and without any charge. Author will have to register if new member in the system. And existing member can Create new book or resume with old book. One Author cannot keep more than 3 incomplete Books, he has to complete 1 book atleast to start new one. Book will be created on basics of Title, Context, No of Pages in books.
Read More

Bus Pass with Barcode Card scan

Web | Desktop Application
Bus Pass with Bar-code Card scan As technology is growing fast, so we need to update ourselves to be in touch with new technology. The current process of bus ticketing is very slow and tedious process. Customer needs to stand in long queue for issuing bus pass in bus Depot which is time consuming and this process is hectic to employees in the Depot as well as user. The project is designed to provide an effective solution of maintaining bus pass information using a bar-code. The system has two logins one for user and other for admin. User can refill their account and extend the validity every time the pass expires. Admin can view all user's details and balance through its login. Every user's pass will be having a bar-code…
Read More

Bus Pass with webcam Scan

Web | Desktop Application
Bus Pass with webcam Scan The project aims to provide an effective solution of maintaining bus pass information using a Qr code. The system has two logins one for user and other for admin. User can refill their account and extend the validity every time the pass expires. Admin can view all users’ details and balance through its login. Every user pass will be having a Qr code that contains user information and validity of pass. Thus while travelling users just have to get their pass scanned and conductor can view the pass validity.
Read More

Canteen Automation System

Web | Desktop Application
Canteen Automation System In today’s age of fast food and take-out, many canteen have chosen to focus on quick preparation and speedy delivery of orders rather than offering a rich dining experience. Until very recently, all of these delivery orders were placed to the waiters or over the phone, but there are many disadvantages to this system, including the inconvenience of the customer needing to have a physical copy of the menu, lack of a visual confirmation that the order was placed correctly, and the necessity for the canteen to have an employee answering the phone and taking orders. What,we propose is a Canteen Automation System, which is a technique of ordering foods online applicable in any food delivery industry. The main advantage of this system is that it greatly…
Read More

Online Visiting Card Creation Project

Web | Desktop Application
Online Visiting Card Creation Project Online Visiting Card Creation Project will have registration for new Users and login for Members. This software will have Admin Login which will check for new request and orders, Member Login in which they can create visiting cards from selected templates. Users may even create their own customize card design and place for order. User is allowed to choose a card design first and even the user name, company contact no and other fields to print on the card. After user finalizes the order he may proceed to payments page. This Ordered Cards will be delivered to their door steps. The Admin Login will accept request to check design, approve cards request, and create bill.
Read More

Efficient Doctor Patient Portal

Web | Desktop Application
Efficient Doctor Patient Portal We here propose a doctor patient handling, managing system that helps doctors in their work and also patients to book doctor appointments and view medical progress. The system allows doctors to manage their booking slots online. Patients are allowed to book empty slots online and those slots are reserved in their name. The system manages the appointment data for multiple doctors for various date and times. Each time a user visits a doctor his/her medical entry is stored in the database by doctor. Next time a user logs in he may view his/her entire medical history as and when needed. At the same time a doctor may view patients medical history even bore the patient visits him. This allows for an automated patient doctor handling system…
Read More

Student Grade Prediction Using C4.5 Decision Tree

Web | Desktop Application
Student Grade Prediction Using C4.5 Decision Tree We here come up with a system where student final grade is predicted based on the marks he had scored during his previous course and years. In order to predict the grade of the student we need some data to analyze and to predict the grade. So we will input student basic information and their previous academic information into the system which will be used to predict the grade of the student. We here used an effective data mining algorithm to predict the result. We used C4.5 decision tree algorithm to predict the grade of the student.C4.5 is a program for inducing classification rules in the form of decision trees from a set of given examples. C4.5 is a software extension of the…
Read More

Class Management System Project

Web | Desktop Application
Class Management System Project This software project is a classes/ Tution management system. It consists of all the data management and storage facilities that are required for effectively managing a class or tution teaching multiple courses and subjects. It consists of multiple teachers and faculty accounts along with their payment status. The system helps in effectively managing and scheduling batches of students as per their courses and exam priorities. The class management system allows the administrator to view and edit data as required. Administrator is notified of various events such as faculty contract renewal, fees date, student or batch fees payment date and other useful events as and when needed. All this functionality ensures no errors and effective management of Class.
Read More

Online Printed T-Shirt Designing

Web | Desktop Application
Online Printed T-Shirt Designing Online Printed T-Shirt Designing will have registration for new Users and login for Members. This software will have Admin Login which will check for new request and orders, Member Login in which they can create customize design using wide range of Colors & Design, and can even place bulk order for the same. The system first allows users to select tshirt design. After that user may choose desired color. The net step allows users to choose designs and text to be printed on the tshirt. After user finalizes the cost of design is calculated and user may pay online for it. This Ordered T-Shirt will be delivered to their door steps. The Admin Login will accept request to check design, approve Order, and create bill.
Read More

Smart Health Prediction Using Data Mining

Data mining, Web | Desktop Application
Smart Health Prediction Using Data Mining It might have happened so many times that you or someone yours need doctors help immediately, but they are not available due to some reason. The Health Prediction system is an end user support and online consultation project. Here we propose a system that allows users to get instant guidance on their health issues through an intelligent health care system online. The system is fed with various symptoms and the disease/illness associated with those systems. The system allows user to share their symptoms and issues. It then processes users symptoms to check for various illness that could be associated with it. Here we use some intelligent data mining techniques to guess the most accurate illness that could be associated with patient’s symptoms. If the…
Read More

Graphical Password To Avoid Shoulder Surfing

Web | Desktop Application
Graphical Password To Avoid Shoulder Surfing Since conventional password schemes are vulnerable to shoulder surfing, many shoulder surfing resistant graphical password schemes have been proposed. However, as most users are more familiar with textual passwords than pure graphical passwords, text-based graphical password schemes have been proposed. Unfortunately, none of existing text-based shoulder surfing resistant graphical password schemes is both secure and efficient enough. In this paper, we propose an improved text-based shoulder surfing resistant graphical password scheme by using colours. In the proposed scheme, the user can easily and efficiently login system. Next, we analyze the security and usability of the proposed scheme, and show the resistance of the proposed scheme to shoulder surfing and accidental login. The shoulder surfing attack in an attack that can be performed by the…
Read More

Online user Behavior Analysis On Graphical Model

Web | Desktop Application
Online user Behavior Analysis On Graphical Model Online shopping is growing on large scale. People purchase their products via internet. They just have to choose their products and make the payment. Users get their products on doorstep. Online shopping had made people’s life easier and faster. As online shopping is increasing, large amount of data on people’s online activities have become available on web. Use of such data can benefit a lot of applications. User behavior, online customer classification can be extracted from these web data. We proposed a system where we can extract the user’s online shopping behavior. System will extract user’s online behavior pattern and will show in graphical format. This graphical format helps the admin during decision making process. We propose a graphical hidden state model based…
Read More

HR Attendance System Using RFID

Sensor, Web | Desktop Application
HR Attendance System Using RFID RFID Based Attendance System is a system developed for daily employee attendance in companies. Employees proper attendance management is till date a critical issue in many companies. Attendance plays a vital role in managing salaries of employees and also in tracking the regularity & sincerity of employees towards their occupation. The process of tracking attendance manually using pen and paper has become an outdated approach. It not only involves fake entries by employees but even sometimes lead to improper evaluation of attendance. There always exist a threat of records/register getting misplaced or may get damage due to unfavourable circumstances. To overcome all these drawbacks and many more than that we intend to develop a system which not only removes the tedious task of tracking attendance…
Read More

Implementing Triple DES With OTP

Web | Desktop Application
Implementing Triple DES With OTP Triple DES is advantageous because it has a significantly sized key length, which is longer than most key lengths affiliated with other encryption modes. It derives from single DES but the technique is used in triplicate and involves three sub keys and key padding when necessary, such as instances where the keys must be increased to 64 bits in length. Known for its compatibility and flexibility, software can easily be converted for Triple DES inclusion. Triple DES encrypts input data three times. The three keys are referred to as k1, k2 and k3. Thus due to the use of 3 key ,triple DES is more secure and is sometimes preferred over the normal DES. The system combines this with the OTP which will also be…
Read More

Search Engine Using Web Annotation

Web | Desktop Application
Search Engine Using Web Annotation When user enters some words in search engine, system fetches automatically those pages which contain those words this happens due to web annotation. Web annotation has become one of the ongoing research topics. Here in this project we will apply web annotation on pages or images. User must enter the image names he is searching for and system will fetch those images which contains same image annotation. Web annotation helps to create user friendliness. A web annotation which is associated with web resources such as web pages or images. With a Web annotation system, a user can add, modify or remove information from a Web resource without modifying the resource itself. Web annotations are visible to the users. We here proposed a system where user…
Read More

Inter college Event Management System

Web | Desktop Application
Inter college Event Management System The project brings the entire manual process of Intercollege event management online which is built using Asp .Net as a front end and SQL Server as a backend. The main purpose of this project is to simplify the process of handling each event by providing a web interface for admin, teacher and students. The admin part consists of multiple modules where admin or the authorized person need to register the college name to initiate/create the event by adding the type of event (indoor or outdoor). System allows admin to add teachers who will conduct the particular event activity which is allotted by the admin itself, also can view the student registration for a particular event and lastly, viewing the results of all events held in…
Read More

Preventing Phishing Attack On Voting System Using Visual Cryptography

Web | Desktop Application
Preventing Phishing Attack On Voting System Using Visual Cryptography Voting system Using Visual Cryptography (VC) aims at providing a facility to cast vote for critical and confidential internal corporate decisions. It has the flexibility to allow casting of vote from any remote place. The election is held in full confidentiality by applying appropriate security measures to allow the voter to vote for any participating candidate only if he logs into the system by entering the correct password which is generated by merging the two shares using VC scheme. Administrator sends share 1 to voter e-mail id before election and share 2 will be available in the voting system for his login during election. Voter will get the secret password to cast his vote by combining share 1 and share 2…
Read More

HR Management System

Web | Desktop Application
HR Management System Decision in assigning proper skillful hands for the project is and important issue in HR Module. The HR Administrator should report with the personal holding the necessary skills required for the project assignment. The decision in making analysis about the employee’s skills is a prime important before booting in. The proposed system of HR Module is the right software to be incorporated into the Automation of HR Software for helping the organization needs with respect to skillful Human Resource. The proposed system provides detail general information about the employee along with Educational, Certification, Skill and Project details. It enhances the HR Management in adding, viewing and updating employees’ details and generates various reports regarding employee’s skill and experience. Suggestions and Grievances posted by the employees are upheld…
Read More

Organizational Procurement Management System

Web | Desktop Application
Organizational Procurement Management System Many domestic enterprises not only procurement costs, labour costs remain high. Especially with the continuous development of enterprises, procurement has expanded the traditional mode of operation and methods of procurement cannot meet the needs of modern enterprise procurement. In order to achieve the pursuit of efficiency and effectiveness, the establishment of procurement management information system is very necessary. In this paper, detailed analysis of the many drawbacks of purchasing management of domestic enterprises on the basis of the procurement and put forward their own views of management information systems, and we using Asp.net technology to establish a specific experimental model. Today, different organizations employ various management techniques to carry out the efficient functioning of their departments. Procurement management is one such form of management, where goods…
Read More

Cooking Recipe Rating Based On Sentiment Analysis

Web | Desktop Application
Cooking Recipe Rating Based On Sentiment Analysis You will find number of recipe online. Some might be correctly posted some may not. Recipes what you read will not be the same what you find after preparation. There are number of recipes you will find online which are incorrect. So in order to get right recipes, recipes must be rated by the user. Here we propose a system where user can select categories and post the recipes. Recipes are rated and commented by the visitors. So that user may end up by finding correct recipe online. We will apply sentiment analysis and text summarization approach to mine data. Sentiment analysis is a machine learning approach in which machine learns and analyze the sentiments, emotions etc about some text data like reviews…
Read More

Detecting Phishing Websites Using Machine Learning

Web | Desktop Application
Detecting Phishing Websites Using Machine Learning There are number of users who purchase products online and make payment through various websites.There are multiple websites who ask user to provide sensitive data such as username, password or credit card details etc. often for malicious reasons. This type of websites is known as phishing website. In order to detect and predict phishing website, we proposed an intelligent, flexible and effective system that is based on using classification Data mining algorithm. We implemented classification algorithm and techniques to extract the phishing data sets criteria to classify their legitimacy. The phishing website can be detected based on some important characteristics like URL and Domain Identity, and security and encryption criteria in the final phishing detection rate. Once user makes transaction through online when he…
Read More

Price Negotiator Ecommerce ChatBot System

Web | Desktop Application
Price Negotiator Ecommerce ChatBot System Agent based automated negotiation can give a flexible instead of a fixed price in e-commerce, and can maximize the payoffs of bath buyer and seller. It can be seen as an ideal and efficient mechanism for business. After discuss the negotiation in e-commerce and intelligent agent technology, state of the art overviews is given of agent based automated negotiation, specifically three main approaches for automated negotiation: the decision theory, the game theory and the negotiation analysis. And then, give a view of some famous models. Finally, we point out that the automated negotiation is still in its infant stage, because there are still some difficulties in this field. The first is the ontology issue, the second is agents’ strategies and third is Communication protocol. Electronic…
Read More

Image Character Recognition Using Signal & Pattern Analysis

Web | Desktop Application
Image Character Recognition Using Signal & Pattern Analysis Optical character recognition is conversion of images of typed, handwritten or printed text into machine-encoded text from image. Here we come up with system where pattern of the image is extracted and image text is recognized using Optical character recognition in matlab. System will recognize the pattern and will detect the characters in image. And will display those characters as output. Since image can be scanned photos or other images. We applied image preprocessing steps in order to extract only text from image. Image patterns will be stored in another directory. The query image is compared with image patterns stored in database. If image matches with the pattern stored in directory, system will apply algorithm to detect the text and display those…
Read More

Sports Events Management Platform for Colleges

Web | Desktop Application
Sports Events Management Platform for Colleges The project brings the entire manual process of sports event management online which is built using Asp .Net as a front end and SQL Server as a backend. The main purpose of this project is to simplify the process of handling each sports event by providing a web interface for admin and teacher. The admin part consists of multiple modules to initiate with the sports event by adding the type of sport (indoor or outdoor), adding student who are interested in a particular sports activity, adding teachers who will conduct the particular sports activity which is allotted by the admin itself and lastly, viewing the results of sports event held in college. The teacher part has come up with handling all the sports related…
Read More

Secure File Storage On Cloud Using Hybrid Cryptography

Cloud Computing, Security and Encryption, Web | Desktop Application
Secure File Storage On Cloud Using Hybrid Cryptography The proposed software product is liable to meet the required security needs of data center of cloud. Blowfish used for the encryption of file slices takes minimum time and has maximum throughput for encryption and decryption from other symmetric algorithms. The idea of splitting and merging adds on to meet the principle of data security. The hybrid approach when deployed in cloud environment makes the remote server more secure and thus, helps the cloud providers to fetch more trust of their users. For data security and privacy protection issues, the fundamental challenge of separation of sensitive data and access control is fulfilled. Cryptography technique translates original data into unreadable form. Cryptography technique is divided into symmetric key cryptography and public key cryptography.…
Read More

ATM Detail Security Using Image Steganography

Security and Encryption, Web | Desktop Application
ATM Detail Security Using Image steganography Now you can securely perform your ATM transactions with the help of this system as it provides 3 level of security. This system works as follows. Once the user enters the PIN, the user is prompted to enter the OTP (One Time Password) which is a 4-digit random password sent by the server to the user’s registered mobile number. On cross verification with the data stored in the system database, the user is allowed to make a transaction. The underlying mechanism involves combining the concepts of Cryptography and Steganography. The PIN and OTP are encrypted using AES 256. Then the encrypted data is steganographed with the image selected by the user which acts as the BASE image. The Steganographed image is sent to the…
Read More

Image Steganography Using Kmeans & Encryption

Security and Encryption, Web | Desktop Application
Image Steganography Using Kmeans & Encryption Steganography involves hiding of text, image or any sensitive information inside another image, video or audio in such a way that an attacker will not be able to detect its presence. Steganography is, many times, confused with cryptography as both the techniques are used to secure information. The difference lies in the fact that steganography hides the data so that nothing appears out of ordinary while cryptography encrypts the text, making it difficult for an outsider to infer anything from it even if they do attain the encrypted text. Both of them are combined to increase the security against various malicious attacks. Image Steganography uses an image as the cover media to hide the secret message. In this paper, we propose an image steganography…
Read More

Social Media Community Using Optimized Clustering Algorithm

Web | Desktop Application
Social Media Community Using Optimized Clustering Algorithm Now-a-days social media is used to introduce new issues and discussion on social media. More number of users participates in discussion via social media. Different users belong to different kind of groups. Positive and negative comments will be posted by the user and they will participate in discussion . Here we proposed a system to group different kind of users and system specifies from which category they belong to. For example film industry, politician etc. Once the social media data such as user messages are parsed and network relationships are identified, data mining techniques can be applied to group of different types of communities. We used K-Means clustering algorithm to cluster data. In this system we detect communities by clustering messages from large…
Read More

Android Smart City Traveler

Android Mobile development, Artificial Intelligence & ML, Web | Desktop Application
Android Smart City Traveler The purpose of developing this android application is to create a schedule for the traveler travelling to city and wanted to explore the city by specifying the time in hours. System then smartly analyzes the questionnaire and creates a schedule for traveler based on provided time. The development is done in two technical languages as Java for Android Application for User/Traveler and Asp .net for Web portal which is used by Admin. First of all, traveler need to register himself by filling up the details using android application. After successful registration, user can login now using login credentials which then proceeds with questionnaire where application ask user about their likings and habits. Based on questionnaire, application smartly analyzes for the place based on user specified time.…
Read More

Android Based School Bus Tracking System

Android Mobile development, Web | Desktop Application
Android Based School Bus Tracking System This system is a combination of web as well as android application where the driver will be using the android application whereas admin and parent will be using web application. This application is meant for drivers who is driving the school bus. System allows admin to add a new driver where driver id and password is generated and stored into the system. The driver will have the android application installed in his android phone, when the driver will login to the application, his GPS location will be sent and stored into database. As soon as driver logs in, GPS location of the driver will be tracked automatically by the application and stores the GPS co-ordinates into database after every 5 minutes. When driver logs…
Read More

Android Attendance System

Android Mobile development, Web | Desktop Application
Android Attendance System The mobile attendance system has been built to eliminate the time and effort wasted in taking attendances in schools and colleges. It also greatly reduces the amount of paper resources needed in attendance data management.This is an android mobile app. It’s built to be used for school/college faculty so that they may take student attendance on their phones. The system is divided into following modules: Student Attendance List Creation: Once this App is installed on a phone, a it allows user to create a student attendance sheet consisting of name, roll number, date, Absent/Present mark and subject. He has to fill student names along with associated roll numbers. Attendance Marking: The faculty has the list on his phone now. He may see the list call roll numbers…
Read More

Android Geo Fencing App Project

Android Mobile development, Web | Desktop Application
Android Geo Fencing App Project This developed project work for parents and their children’s. The parents and children’s both should have GPS based smart phones. The application is used to track the child’s location using their smartphone. To access this application, parent need to create an account by filling up basic registration details and create a login id and password. Using valid login credentials, parent can login and access the application modules. After successful login, parent need to add their child details and also need to create a login id and password for their child in order to track their location. While registering their child name, parent need to set a geo fence around their children by selecting a point on map. Parent can also update the fence around their…
Read More

Secure Mining of Association Rules in Horizontally Distributed Databases

Data mining
Secure Mining of Association Rules in Horizontally Distributed Databases We propose a protocol for secure mining of association rules in horizontally distributed databases. The current leading protocol is that of Kantarcioglu and Clifton [18]. Our protocol, like theirs, is based on the Fast Distributed Mining (FDM) algorithm of Cheung et al. [8], which is an unsecured distributed version of the Apriori algorithm. The main ingredients in our protocol are two novel secure multi-party  algorithms—one that computes the union of private subsets that each of the interacting players hold, and another that tests the inclusion of an element held by one player in a subset held by another. Our protocol offers enhanced privacy with respect to the protocol in [18]. In addition, it is simpler and is significantly more efficient in…
Read More

Policy-by-Example for Online Social Networks.

Cloud Computing, Data mining, Security and Encryption
Policy-by-Example for Online Social Networks We introduce two approaches for improving privacy policy management in online social networks. First, we introduce a mechanism using proven clustering techniques that assists users in grouping their friends for group based policy management approaches. Second, we introduce a policy management approach that leverages a user's memory and opinion of their friends to set policies for other similar friends. We refer to this new approach as Same-As Policy Management. To demonstrate the e ectiveness of our policy management improvements, we implemented a prototype Facebook application and conducted an extensive user study. Leveraging proven clustering techniques, we demonstrated a 23% reduction in friend grouping time. In addition, we demonstratedconsiderable reductions in policy authoring time using Same As Policy Management over traditional group based policy management approaches. Finally,…
Read More

An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds (Data Mining with cloud)

Data mining
An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds (Data Mining with cloud) We propose a mediated certificateless encryption scheme without pairing operations for securely sharing sensitive information in public clouds. Mediated certificateless public key encryption (mCL-PKE) solves the key escrow problem in identity based encryption and certificate revocation problem in public key cryptography. However, existing mCL-PKE schemes are either inefficient because of the use of expensive pairing operations or vulnerable against partial decryption attacks. In order to address the performance and security issues, in this paper, we first propose a mCL-PKE scheme without using pairing operations. We apply our mCL-PKE scheme to construct a practical solution to the problem of sharing sensitive information in public clouds. The cloud is employed as a secure storage as well as…
Read More

Infrequent Weighted Itemset Mining Using Frequent Pattern Growth

Data mining
Infrequent Weighted Itemset Mining Using Frequent Pattern Growth Frequent weighted itemsets represent correlations frequently holding in data in which items may weight differently. However, in some contexts, e.g., when the need is to minimize a certain cost function, discovering rare data correlations is more interesting than mining frequent ones. This paper tackles the issue of discovering rare and weighted itemsets, i.e., the infrequent weighted itemset (IWI) mining problem. Two novel quality measures are proposed to drive the IWI mining process. Furthermore, two algorithms that perform IWI and Minimal IWI mining efficiently,driven by the proposed measures, are presented. Experimentalresults show efficiency and effectiveness of the proposed approach.
Read More

Interpreting the Public Sentiment Variations on Twitter

Data mining
Interpreting the Public Sentiment Variations on Twitter Millions of users share their opinions on Twitter, making it a valuable platform for tracking and analyzing public sentiment. Such tracking and analysis can provide critical information for decision making in various domains. Therefore it has attracted attention in both academia and industry. Previous research mainly focused on modeling and tracking public sentiment. In this work, we move one step further to interpret sentiment variations. We observed that emerging topics(named foreground topics) within the sentiment variation periods are highly related to the genuine reasons behind the variations. Based on this observation, we propose a Latent Dirichlet Allocation (LDA) based model, Foreground and Background LDA (FB-LDA), to distill foreground topics and filter out lngstanding background topics. These foreground topics can give potential interpretations of…
Read More

Supporting Privacy Protection in Personalized Web Search

Data mining, Web | Desktop Application
Supporting Privacy Protection in Personalized Web Search Personalized web search (PWS) has demonstrated its effectiveness in improving the quality of various search services on the Internet. However, evidences show that users’ reluctance to disclose their private information during search has become a major barrier for the wide proliferation of PWS. We study privacy protection in PWS applications that model user preferences as hierarchical user profiles. We propose a PWS framework called UPS that can adaptively generalize profiles by queries while respecting user specified privacy requirements. Our runtime generalization aims at striking a balance between two predictive metrics that evaluate the utility of personalization and the privacy risk of exposing the generalized profile. We present two greedy algorithms, namely GreedyDP and GreedyIL, for runtime generalization. We also provide an online prediction…
Read More

Keyword Query Routing

Data mining, Web | Desktop Application
Keyword Query Routing Keyword search is an intuitive paradigm for searching linked data sources on the web. We propose to route keywords only to relevant sources to reduce the high cost of processing keyword search queries over all sources. We propose a novel method for computing top-k routing plans based on their potentials to contain results for a given keyword query. We employ a keyword-element relationship summary that compactly represents relationships between keywords and the data elements mentioning them. A multilevel scoring mechanism is proposed for computing the relevance of routing plans based on scores at the level of keywords, data elements, element sets, and subgraphs that connect these elements. Experiments carried out using 150 publicly available sources on the web showed that valid plans (precision@1 of 0.92) that are…
Read More

Set Predicates in SQL: Enabling Set- Level Comparisons for Dynamically Formed Groups

Data mining, Web | Desktop Application
Set Predicates in SQL: Enabling Set- Level Comparisons for Dynamically Formed Groups In data warehousing and OLAP applications, scalar level predicates in SQL become increasingly inadequate to support a class of operations that require set-level comparison semantics, i.e., comparing a group of tuples with multiple values. Currently, complex SQL queries composed by scalar-level operations are often formed to obtain even very simple set-level semantics. Such queries are not only difficult to write but also challenging for a database engine to optimize, thus can result in costly evaluation. This paper proposes to augment SQL with set predicate, to bring out otherwise obscured set-level semantics. We studied two approaches to processing set predicates—an aggregate function-based approach and a bitmap index-based approach. Moreover, we designed a histogram-based probabilistic method of set predicate selectivity…
Read More

An Empirical Performance Evaluation of Relational Keyword Search Techniques

Data mining
An Empirical Performance Evaluation of Relational Keyword Search Techniques Extending the keyword search paradigm to relational data has been an active area of research within the database and IR community during the past decade. Many approaches have been proposed, but despite numerous publications, there remains a severe lack of standardization for the evaluation of proposed search techniques. Lack of standardization has resulted in contradictory results from different evaluations, and the numerous discrepancies muddle what advantages are proffered by different approaches. In this paper, we present the most extensive empirical performance evaluation of relational keyword search techniques to appear to date in the literature. Our results indicate that many existing search techniques do not provide acceptable performance for realistic retrieval tasks. In particular, memory consumption precludes many search techniques from scaling…
Read More

Facilitating Document Annotation Using Content and Querying Value

Data mining, Web | Desktop Application
Facilitating Document Annotation Using Content and Querying Value A large number of organizations today generate and share textual descriptions of their products, services, and actions. Such collections of textual data contain significant amount of structured information, which remains buried in the unstructured text. While information extraction algorithms facilitate the extraction of structured relations, they are often expensive and inaccurate, especially when operating on top of text that does not contain any instances of the targeted structured information. We present a novel alternative approach that facilitates the generation of the structured metadata by identifying documents that are likely to contain information of interest and this information is going to be subsequently useful for querying the database. Our approach relies on the idea that humans are more likely to add the necessary metadata during creation time, if prompted by the interface; or that it is much easier…
Read More

Context-Based Diversification for Keyword Queries Over XML Data

Data mining, Web | Desktop Application
Context-Based Diversification for Keyword Queries Over XML Data While keyword query empowers ordinary users to search vast amount of data, the ambiguity of keyword query makes it difficult to effectively answer keyword queries, especially for short and vague keyword queries. To address this challenging problem, in this paper we propose an approach that automatically diversifies XML keyword search based on its different contexts in the XML data. Given a short and vague keyword query and XML data to be searched, we first derive keyword search candidates of the query by a simple feature selection model. And then, we design an effective XML keyword search diversification model to measure the quality of each candidate. After that, two efficient algorithms are proposed to incrementally compute top-k qualified query candidates as the diversified search intentions. Two selection criteria are targeted: the k selected query candidates are most relevant to…
Read More

Tweet Segmentation and Its Application to Named Entity Recognition

Data mining, Web | Desktop Application
Tweet Segmentation and Its Application to Named Entity Recognition Twitter has attracted millions of users to share and disseminate most up-to-date information, resulting in large volumes of data produced everyday. However, many applications in Information Retrieval (IR) and Natural Language Processing (NLP) suffer severely from the noisy and short nature of tweets. In this paper, we propose a novel framework for tweet segmentation in a batch mode, called HybridSeg . By splitting tweets into meaningful segments, the semantic or context information is well preserved and easily extracted by the downstream applications. HybridSeg finds the optimal segmentation of a tweet by maximizing the sum of the stickiness scores of its candidate segments. The stickiness score considers the probability of a segment being a phrase in English (i.e., global context) and the probability of a segment being a phrase within the batch of tweets (i.e., local…
Read More

Polarity Consistency Checking for Domain Independent Sentiment Dictionaries

Data mining, Web | Desktop Application
Polarity Consistency Checking for Domain Independent Sentiment Dictionaries Polarity classification of words is important for applications such as Opinion Mining and Sentiment Analysis. A number of sentiment word/sense dictionaries have been manually or (semi)automatically constructed. We notice that these sentiment dictionaries have numerous inaccuracies. Besides obvious instances, where the same word appears with different polarities in different dictionaries, the dictionaries exhibit complex cases of polarity inconsistency, which cannot be detected by mere manual inspection. We introduce the concept of polarity consistency of words/senses in sentiment dictionaries in this paper. We show that the consistency problem is NP-complete. We reduce the polarity consistency problem to the satisfiability problem and utilize two fast SAT solvers to detect inconsistencies in a sentiment dictionary. We perform experiments on five sentiment dictionaries and WordNet to show inter- and intra-dictionaries inconsistencies.
Read More

RRW—A Robust and Reversible Watermarking Technique for Relational Data

Data mining, Web | Desktop Application
RRW—A Robust and Reversible Watermarking Technique for Relational Data Advancement in information technology is playing an increasing role in the use of information systems comprising relational databases. These databases are used effectively in collaborative environments for information extraction; consequently, they are vulnerable to security threats concerning ownership rights and data tampering. Watermarking is advocated to enforce ownership rights over shared relational data and for providing a means for tackling data tampering. When ownership rights are enforced using watermarking, the underlying data undergoes certain modifications; as a result of which, the data quality gets compromised. Reversible watermarking is employed to ensure data quality along-with data recovery. However, such techniques are usually not robust against malicious attacks and do not provide any mechanism to selectively watermark a particular attribute by taking into account its role in knowledge discovery. Therefore, reversible watermarking is required that ensures; (i) watermark encoding and decoding by…
Read More

Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation

Cloud Computing, Web | Desktop Application
Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation With the wide deployment of public cloud computing infrastructures, using clouds to host data query services has become an appealing solution for the advantages on scalability and cost-saving. However, some data might be sensitive that the data owner does not want to move to the cloud unless the data confidentiality and query privacy are guaranteed. On the other hand, a secured query service should still provide efficient query processing and significantly reduce the in-house workload to fully realize the benefits of cloud computing. We propose the random space perturbation (RASP) data perturbation method to provide secure and efficient range query and kNN query services for protected data in the cloud. The RASP data perturbation method combines order preserving encryption, dimensionality expansion, random…
Read More

Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions

Cloud Computing, Web | Desktop Application
Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions In distributed transactional database systems deployed over cloud servers, entities cooperate to form proofs of authorizations that are justified by collections of certified credentials. These proofs and credentials may be evaluated and collected over extended time periods under the risk of having the underlying authorization policies or the user credentials being in inconsistent states. It therefore becomes possible for policy-based authorization systems to make unsafe decisions that might threaten sensitive resources. In this paper, we highlight the criticality of the problem. We then define the notion of trusted transactions when dealing with proofs of authorization. Accordingly, we propose several increasingly stringent levels of policy consistency constraints, and present different enforcement approaches to guarantee the trustworthiness of transactions executing on cloud servers. We propose a Two-Phase Validation Commit protocol…
Read More

A Location- and Diversity-aware News Feed System for Mobile Users

Android Mobile development, Security and Encryption
A Location- and Diversity-aware News Feed System for Mobile Users A location-aware news feed system enables mobile users to share geo-tagged user-generated messages, e.g., a user can receive nearby messages that are the most relevant to her. In this paper, we present MobiFeed that is a framework designed for scheduling news feeds for mobile users. MobiFeed consists of three key functions, location prediction, relevance measure, and news feed scheduler. The location prediction function is designed to predict a mobile user’s locations based on an existing path prediction algorithm. The relevance measure function is implemented by combining the vector space model with non-spatial and spatial factors to determine the relevance of a message to a user. The news feed scheduler works with the other two functions to generate news feeds for…
Read More

Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search

Security and Encryption, Web | Desktop Application
Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search Existing semantically secure public-key searchable encryption schemes take search time linear with the total number of the ciphertexts. This makes retrieval from large-scale databases prohibitive. To alleviate this problem, this paper proposes Searchable Public-Key Ciphertexts with Hidden Structures (SPCHS) for keyword search as fast as possible without sacrificing semantic security of the encrypted keywords. In SPCHS, all keyword-searchable ciphertexts are structured by hidden relations, and with the search trapdoor corresponding to a keyword, the minimum information of the relations is disclosed to a search algorithm as the guidance to find all matching ciphertexts efficiently. We construct a SPCHS scheme from scratch in which the ciphertexts have a hidden star-like structure. We prove our scheme to be semantically secure in…
Read More

Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud

Cloud Computing, Data mining, Parallel And Distributed System, Security and Encryption, Web | Desktop Application
Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud With data storage and sharing services in the cloud, users can easily modify and share data as a group. To ensure shared data integrity can be verified publicly, users in the group need to compute signatures on all the blocks in shared data. Different blocks in shared data are generally signed by different users due to data modifications performed by different users. For security reasons, once a user is revoked from the group, the blocks which were previously signed by this revoked user must be re-signed by an existing user. The straightforward method, which allows an existing user to download the corresponding part of shared data and re-sign it during user revocation, is inefficient due to the…
Read More

Identity-Based Distributed Provable Data Possession in Multicloud Storage

Cloud Computing, Web | Desktop Application
Identity-Based Distributed Provable Data Possession in Multicloud Storage Remote data integrity checking is of crucial importance in cloud storage. It can make the clients verify whether their outsourced data is kept intact without downloading the whole data. In some application scenarios, the clients have to store their data on multi-cloud servers. At the same time, the integrity checking protocol must be efficient in order to save the verifier’s cost. From the two points, we propose a novel remote data integrity checking model: ID-DPDP (identity-based distributed provable data possession) in multi-cloud storage. The formal system model and security model are given. Based on the bilinear pairings, a concrete ID-DPDP protocol is designed. The proposed ID-DPDP protocol is provably secure under the hardness assumption of the standard CDH (computational Diffie-Hellman) problem. In…
Read More

Query Aware Determinization of Uncertain Objects

Data mining, Web | Desktop Application
Query Aware Determinization of Uncertain Objects This paper considers the problem of determinizing probabilistic data to enable such data to be stored in legacy systems that accept only deterministic input. Probabilistic data may be generated by automated data analysis/enrichment techniques such as entity resolution, information extraction, and speech processing. The legacy system may correspond to pre-existing web applications such as Flickr, Picasa, etc. The goal is to generate a deterministic representation of probabilistic data that optimizes the quality of the end-application built on deterministic data. We explore such a determinization problem in the context of two different data processing tasks -- triggers and selection queries. We show that approaches such as thresholding or top-1 selection traditionally used for determinization lead to suboptimal performance for such applications. Instead, we develop a…
Read More

Discovery of Ranking Fraud for Mobile Apps

Data mining
Discovery of Ranking Fraud for Mobile Apps Ranking fraud in the mobile App market refers to fraudulent or deceptive activities which have a purpose of bumping up the Apps in the popularity list. Indeed, it becomes more and more frequent for App develops to use shady means, such as inflating their Apps’ sales or posting phony App ratings, to commit ranking fraud. While the importance of preventing ranking fraud has been widely recognized, there is limited understanding and research in this area. To this end, in this paper, we provide a holistic view of ranking fraud and propose a ranking fraud detection system for mobile Apps. Specifically, we investigate two types of evidences, ranking based evidences and rating based evidences, by modeling Apps’ ranking and rating behaviors through statistical hypotheses…
Read More

Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption

Cloud Computing, Web | Desktop Application
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from it. Various schemes based on the Attribute-Based Encryption have been proposed to secure the cloud storage. However, most work focuses on the data contents privacy and the access control, while less attention is paid to the privilege control and the identity privacy. In this paper, we present a semi-anonymous privilege control scheme AnonyControl to address not only the data privacy but also the user identity privacy in existing access control schemes.AnonyControl decentralizes the central authority to limit the identity leakage and thus achieves semi-anonymity. Besides, it…
Read More

Design of a Secured E-voting System

Android Mobile development
Design of a Secured E-voting System E-voting systems are becoming popular with the widespread use of computers and embedded systems. Security is the vital issue should be considered in such systems. This paper proposes a new e-voting system that fulfills the security requirements of e-voting. It is based on homomorphic property and blind signature scheme. The proposed system is implemented on an embedded system which serves as a voting machine. The system employes RFID to store all conditions that comply with the rule of the government to check voter eligibility.
Read More

Shopping Application System With Near Field Communication (NFC) Based on Android

Android Mobile development, Web | Desktop Application
Shopping Application System With Near Field Communication (NFC) Based on Android The rapid development of mobile communications systems today, along with the changing times and technology, both in terms of hardware, operating system used and the use of Internet bandwidth, making some mobile applications also contribute to exploit these developments. Mobile Commerce Applications for an example, became the most popular applications for mobile users who do not want to trouble yourself with having to carry cash everywhere. An important technology behind mobile payments is called Near Field Communication (NFC). As an indication that NFC represents the potential and tremendous business, leading companies such as Nokia, Microsoft and NXP Semiconductors, actively engaged in the NFC Forum. Shopping application process integrated with NFC technologybased on Android. Shopping application system designed, for the…
Read More

Developing an Android based Learning Application for Mobile Devices

Android Mobile development
Developing an Android based Learning Application for Mobile Devices his paper is about the development of MLEA, a platform that assists, through Android cellphones and tablets, the mobility of users of learning virtual environments. MLEA is an application that implements computational techniques such as web services, design patterns, ontologies, and mobile computational techniques in order to allow the communication between mobile devices and the content management system – Moodle. It´s based on a service oriented, client server architecture that combines the REST protocol and JSON format for data interchange. The client will be provided with features for alerts, file downloads, chats and forums, grade books, quizzes, and calendar, among others.
Read More

Location Based Services using Android Mobile Operating System

Android Mobile development, Web | Desktop Application
Location Based Services using Android Mobile Operating System The motivation for every location based information system is: “To assist with the exact information, at right place in real time with personalized setup and location sensitiveness”. In this era we are dealing with palmtops and iPhones, which are going to replace the bulky desktops even for computational purposes. We have vast number of applications and usage where a person sitting in a roadside café needs to get relevant data and information. Such needs can only be catered with the help of LBS. These applications include security related jobs, general survey regarding traffic patterns, decision based on vehicular information for validity of registration and license numbers etc. A very appealing application includes surveillance where instant information is needed to decide if the…
Read More

Mobile Phone Based Drunk Driving Detection

Android Mobile development
Mobile Phone Based Drunk Driving Detection Drunk driving, or officially Driving Under the Influence (DUI) of alcohol, is a major cause of traffic accidents throughout the world. In this paper, we propose a highly efficient system aimed at early detection and alert of dangerous vehicle maneuvers typically related to drunk driving. The entire solution requires only a mobile phone placed in vehicle and with accelerometer and orientation sensor. A program installed on the mobile phone computes accelerations based on sensor readings, and compares them with typical drunk driving patterns extracted from real driving tests. Once any evidence of drunk driving is present, the mobile phone will automatically alert the driver or call the police for help well before accident actually happens. We implement the detection system on Android G1 phone…
Read More

Android based elimination of potholes

Android Mobile development, Web | Desktop Application
Android based elimination of potholes Its a web based project where user or normal residential people can complain about their nearby potholes. They can take an image of it and upload it to submit to BMC department. Every user will have their own credentials to login and to view the potholes. BMC will have their own admin login details to look after the posting and tackle or reply to each complaints so that they can sort those problem as soon as possible.
Read More

A Personalized Mobile Search Engine

Android Mobile development
A Personalized Mobile Search Engine We propose a personalized mobile search engine, PMSE, that captures the users’ preferences in the form of concepts by mining their clickthrough data. Due to the importance of location information in mobile search, PMSE classifies these concepts into content concepts and location concepts. In addition, users’ locations (positioned by GPS) are used to supplement the location concepts in PMSE. The user preferences are organized in an ontology-based, multi-facet user profile, which are used to adapt a personalized ranking function for rank adaptation of future search results. To characterize the diversity of the concepts associated with a query and their relevances to the users need, four entropies are introduced to balance the weights between the content and location facets. Based on the client-server model, we also…
Read More

Designing the Next Generation of Mobile Tourism Application based on Situation Awareness

Android Mobile development
Designing the Next Generation of Mobile Tourism Application based on Situation Awareness Mobile tourism applications are changing the way travelers plan and experience tourism in the years to come. A large and growing body of literature has investigated the development of context awareness mobile applications for tourism industry. Various aspects of context awareness are studied and applied in tour guide companions and recommendation systems. However, these context awareness mobile applications do not improve traveler’s situation awareness especially in pre-visiting and during visiting phases. In other words, when using mobile applications, travelers may not perceive the situation correctly, fail to comprehend the situation or they are unable to anticipate the future development. This paper proposes a theoretical approach for designing mobile tourism applications using situation awareness. Three scenarios of traveler visiting…
Read More

Secure Authentication using Image Processing and Visual Cryptography for Banking Applications

Image Processing, Web | Desktop Application
Secure Authentication using Image Processing and Visual Cryptography for Banking Applications Core banking is a set of services provided by a group of networked bank branches. Bank customers may access their funds and perform other simple transactions from any of the member branch ofces. The major issue in core banking is the authenticity of the customer. Due to unavoidable hacking of the databases on the internet, it is always quite difcult to trust the information on the internet. To solve this problem of authentication, we are proposing an algorithm based on image processing and visual cryptography. This paper proposes a technique of processing the signature of a customer and then dividing it into shares. Total number of shares to be created is depending on the scheme chosen by the bank.…
Read More

An Algorithm to Automatically Generate Schedule for School Lectures Using a Heuristic Approach

Web | Desktop Application
An Algorithm to Automatically Generate Schedule for School Lectures Using a Heuristic Approach This paper proposes a general solution for the School timetabling problem. Most heuristic proposed earlier approaches the problem from the students’ point of view. This solution, however, works from the teachers’ point of view i.e. teacher availability for a given time slot. While all the hard constraints (e.g. the availability of teachers, etc.) are resolved rigorously, the scheduling solution presented in this paper is an adaptive one, with a primary aim to solve the issue of clashes of lectures and subjects, pertaining to teachers.
Read More

A Mixed Reality Virtual Clothes Try-On System

Web | Desktop Application
A Mixed Reality Virtual Clothes Try-On System Virtual try-on of clothes has received much attention recently due to its commercial potential. It can be used for online shopping or intelligent recommendation to narrow down the selections to a few designs and sizes. In this paper, we present a mixed reality system for 3D virtual clothes try-on that enables a user to see herself wearing virtual clothes while looking at a mirror display, without taking off her actual clothes. The user can select various virtual clothes for trying-on. The system physically simulates the selected virtual clothes on the user's body in real-time and the user can see virtual clothes fitting on the her mirror image from various angles as she moves. The major contribution of this paper is that we automatically…
Read More

Sales & Inventory Prediction using Data Mining

Data mining, Web | Desktop Application
Sales & Inventory Prediction using Data Mining Data mining, the extraction of hidden predictive information from large databases, is a powerful new technology with great potential to help companies focus on the most important information in their data warehouses. Data mining tools predict future trends and behaviors, allowing businesses to make proactive, knowledge-driven decisions. The automated, prospective analyses offered by data mining move beyond the analyses of past events provided by retrospective tools typical of decision support systems. Data mining tools can answer business questions that traditionally were too time consuming to resolve. They scour databases for hidden patterns, finding predictive information that experts may miss because it lies outside their expectations.
Read More